-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#292 Migrated to Spring Boot 3 using OpenRewrite #293
#292 Migrated to Spring Boot 3 using OpenRewrite #293
Conversation
Please note: - Galapagos is now on Java 17 - KafkaSenderImpl no longer needs KafkaFutureDecoupler since kafkaTemlate.send() now returns a CompletableFuture - KafkaSenderImplTest now performs an assertFalse() as a result - SecurityConfig has been commented out since Keycloak is deprecated and not supported in Spring Boot 3 / Spring 6. Unfortunately I don't know how to implement OAuth 2 at this time either. I can't seem to figure out how to run it locally - I get a 401 error when I try to run it from my IDE with the demo,democonf,actuator profiles: Could not access or read /service_accounts workaround endpoint: Server returned 401 for /service_accounts OpenRewrite configuration used to perform migration: ```xml <plugin> <groupId>org.openrewrite.maven</groupId> <artifactId>rewrite-maven-plugin</artifactId> <version>5.2.4</version> <configuration> <activeRecipes> <recipe>org.openrewrite.java.spring.boot3.UpgradeSpringBoot_3_0</recipe> </activeRecipes> </configuration> <dependencies> <dependency> <groupId>org.openrewrite.recipe</groupId> <artifactId>rewrite-spring</artifactId> <version>5.0.2</version> </dependency> </dependencies> </plugin> ```
Creating a separate work branch since SecurityConfig needs to be re-implemented may be the best approach |
Hi Jim, thanks for your contribution! The KafkaFutureDecoupler had not only the purpose of converting the Future, but also to really decouple the Futures from the Core Kafka Thread. Without this, concatenated calls like I will have a look in replacing the Keycloak lib in Spring Security. I already did that in another project, so that should not be much of an issue. The |
Hi Florian, I'm relieved to hear that you've done the migration off of Keycloak before. Thanks for letting me know about the I'm not sure exactly how much help I can be going forward. Unfortunately I'm busy the next few weeks focusing on other things, but hopefully I can try out any changes you make. Thanks, |
Also, minor fixes in Spring Boot 3 context, and cleanups on the way.
…oaded method to KafkaFutureDecoupler to accept new return type of kafkaTemplate.send()
@albrechtflo-hg I've reverted changes to |
…ade-to-spring-boot-3
OK, it was not as simple as expected to replace Keycloak; mainly because Galapagos uses roles configured in Keycloak clients for authorization, and because the UI used lots of stuff from the Keycloak lib. There are now some new properties to configure the required realm names to use from the JWT, and a whole new OAuth2 configuration file, replacing the |
Please note:
I can't seem to figure out how to run it locally - I get a 401 error when I try to run it from my IDE with the demo,democonf,actuator profiles:
Could not access or read /service_accounts workaround endpoint: Server returned 401 for /service_accounts
OpenRewrite configuration used to perform migration: